At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for controlling user access to encrypted data
Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a...
Global state synchronization for securely managed asymmetric network
The present invention provides a system and method is disclosed for the development and maintenance of a globally distributed state session table wherein a...
Mobile communications device providing secure element data management
features and related methods
A mobile communications device may include a near field communications (NFC) device, an input device configured to generate a memory wipe command, a memory, and...
A semiconductor device with a novel structure in which storage capacity needed for holding data can be secured even with miniaturized elements is provided. In...
Securing gaming transactions
Providing tamper-evident transaction data for transactions relating to a draw or game event such as a lottery or other game of chance or skill. The...
System and method for dynamic FOB synchronization and personalization
A system generally for personalizing and synchronizing fob data in the context of a distributed transaction system is disclosed. A dynamic fob synchronization...
Apparatus and method of maintaining and repairing banknote validator using
There is provided an apparatus and a method of maintaining, repairing and/or optimizing a banknote validator using a network. The apparatus includes a banknote...
System and method for a secure cardholder load and storage device
A system for a secure cardholder and storage device includes a mobile communication device and a secure card transporter (SCT). The SCT includes a Near Field...
Selectively securing a hot-swappable data storage device to prevent data
A method and computer program product secure a hot-swap data storage device against being manually physically removed from an operable position within a chassis...
Trusted and secure techniques for item delivery and execution
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a...
System and method for securing sensitive data
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first...
Automated and delegated model-based row level security
Business groups are created to secure business entities of a BI data model. In one aspect, a user to be secured is selected and a business group of the BI model...
Tape backup method
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
Method and system for securely transmitting deterrent data
A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data...
Techniques for secure data management in a distributed environment
Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel...
System and method for unattended computer system access
A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local...
Familiar dynamic human challenge response test content
Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are...
Security server for configuring and programming secure microprocessors
A security server for programming configuration settings and application images into a target device is disclosed. The security server includes two secure...
Systems, methods, and apparatuses for testing mobile device applications
Aspects of the present disclosure generally relate to systems and methods for facilitating optimization of mobile application testing. In one embodiment, a...
Information processing method and apparatus for recovering state of system
A disclosed information processing method is executed by a computer and includes: storing context representing a state of a processor in the computer into a...
Secure system time reporting
Technologies related to secure system time reporting are generally described. In some examples, responses to some system time requests may be manipulated to...
Systems and methods for environmental testing and evaluation of
non-destructive inspection sensors
A system and method for environmental testing and evaluation of non-destructive inspection (NDI) sensors is provided. The system has a structure having a...
Bandwidth guaranteed system, radio node device and bandwidth guaranteeing
To establish an alternative path without giving an influence on signal continuity to a data transmission line to which a communication bandwidth cannot be...
Mobile device and method to monitor a baseband processor in relation to
the actions on an applicaton processor
A method and device to analyze the security of a mobile terminal having application and baseband processors are described. Various information may be acquired...
Security method for the verification of an information retrieval request
The invention is related to security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a...
Methods and devices for OTA management of subscriber identity modules
Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a...
System and method for managing OTA provisioning applications through use
of profiles and data preparation
A method using a non-transitory processor for providing an application product including receiving an application profile, a key profile, a secure element (SE)...
Method and apparatus for handling handover procedure
The present invention provides a method for handling a handover procedure for a Radio Resource Control (RRC) layer in a user equipment (UE) of a wireless...
Method and system for global navigation satellite system configuration of
wireless communication applications
Methods and systems for global positioning navigate satellite system configuration of wireless communication applications may comprise in a wireless...
Billing varied service based on tier
A mobile communication device that monitors and reports consumption of multi-tiered communication services is disclosed. The mobile communication device...
Managed peer-to-peer applications, systems and methods for distributed
data access and storage
Applications, systems and methods for backing up data include securely connecting at least first and second privately addressed computers over a network,...
Method and apparatus for enhancing communication security
A method and apparatus can be configured to transmit indicators to a network entity. The indicators indicate whether security will be applied to a media data,...
Secure control for desktop secure video teleconferencing
Method, system, and computer program product example embodiments of the invention are disclosed to provide multi-network secure video teleconferencing (VTC) for...
Cyber security adaptive analytics threat monitoring system and method
A system and method of detecting command and control behavior of malware on a client computer is disclosed. One or more DNS messages are monitored from one or...
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable...
Cross-domain object models for securely sharing information between
network security domains
Techniques are described for controlling transfer of information in a secure manner across multiple network security domains. As described herein, cross-domain...
Securing digital content system and method
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or...
Network coding-based anonymous communication
A computer-based peer-to-peer anonymous networking using a coding scheme with a formal information theoretic security characterization to construct a...
Systems and methods for secure remote access
Embodiments of the disclosure can include systems and methods for secure remote transfers. The onsite monitoring system secure file transfer solution can allow...
Plant communication network
An embodiment of the disclosure provides a communication network having a plurality of end devices protected by multilayer switches that receive data packets in...
White-list firewall based on the document object model
Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to...
MAC aggregation with message multiplicity for use in a multi-node data
A MAC aggregation technique utilizing a large field addition operation is disclosed. The large field addition operation defines the addition of two or more MACs...
Data security system
A data security system that includes a first memory device to store message data to be secured, a second memory device to store microcode including an...
Information processing device and computer program product
According to an embodiment, a device includes a processor unit, a control unit, a setting unit, a writing unit, and an executing unit. The processor unit is...
Data storage medium having security function and output apparatus therefor
Provided are a storage medium, which has a security function, for storing media content and an output apparatus for outputting data stored in the storage...
Security monitoring with programmable mapping
An integrated security arrangement is implemented in a variety of embodiments. In one such embodiment an integrated security arrangement includes a plurality of...
Tablet based kiosk
A tablet based kiosk to securely support a tablet such as a personal computer to receive, transmit and display information or data comprising a tablet mount...
In-network online storage with increased session bandwidth
A system includes a private communications network to provide content to a user using a first, base amount of bandwidth, a policy server, coupled to the...
Wireless mobile transaction system and the procedure for carrying out
transactions with a mobile phone
The invention belongs to the field of systems for provision of computer-supported transactions with the use of a mobile phone, more exactly to the field of...
Electronic commerce with cryptographic authentication
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received...